I don't think it was publicized as well as they could have at the time.
I caught it years ago because I focus on AD but the fact that they still
look for it in the ADRAP (AKA-Healthcheck) leads me to believe it's
still an issue at customer sites. I think the KB is at v9 now and  it
has a LOT more info than it used to when it basically said- "you don't
really need this, turn it off"

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Thursday, February 26, 2009 12:10 PM
To: NT System Admin Issues
Subject: Re: Disable services (was: Mystery Domains)

 

I for one did not know about that and now get the pleasure of looking
over the article and dealing with my mistake.  I do thank you though!

 

Jon

On Thu, Feb 26, 2009 at 2:12 PM, Free, Bob <r...@pge.com> wrote:

I figured you knew that and you had already addressed it :-)

My message was for those among us who may not have been aware of it...


-----Original Message-----
From: Scott Kaufman at HQ [mailto:skauf...@ittesi.com]

Sent: Thursday, February 26, 2009 11:03 AM
To: NT System Admin Issues
Subject: RE: Disable services (was: Mystery Domains)

Yes.
Done that.
I agree with joe -- it's caused issues over the years :(


Scott Kaufman
Lead Network Analyst
ITT ESI, Inc.


-----Original Message-----
From: Free, Bob [mailto:r...@pge.com]
Sent: Thursday, February 26, 2009 1:52 PM
To: NT System Admin Issues
Subject: RE: Disable services (was: Mystery Domains)

And hopefully, if you are disabling DLT, you have disabled Distributed
Link Tracking Server service on your DC's long ago[1] and considered
cleaning up the droppings in AD that were left behind before you
disabled it if you ever had it running.

Distributed Link Tracking on Windows-based domain controllers
http://support.microsoft.com/kb/312403

[1]"That service is off by default in Windows Server 2003 AD. It is a
stupid service, not sure why it made it to production." joe Richards



-----Original Message-----
From: Scott Kaufman at HQ [mailto:skauf...@ittesi.com]
Sent: Thursday, February 26, 2009 6:06 AM
To: NT System Admin Issues
Subject: RE: Disable services (was: Mystery Domains)

For servers(Non-DCs),
GPOs disable: Audio Service, Messenger, Computer Browser, Distributed
Link Tracking Client, wireless configuration
GPOs enable: DNS client, windows time, snmp service

For clients
GPOs disable: computer browser, messenger, Distributed Link Tracking
Client
GPOs enable: dns client, dhcp client, windows time



Scott Kaufman
Lead Network Analyst
ITT ESI, Inc.

-----Original Message-----
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonhhc.com]
Sent: Thursday, February 26, 2009 8:48 AM
To: NT System Admin Issues
Subject: Disable services (was: Mystery Domains)

This brings up a good point - what other services do you typically
disable?


-----Original Message-----
From: David Lum [mailto:david....@nwea.org]
Sent: Wednesday, February 25, 2009 5:00 PM
To: NT System Admin Issues
Subject: RE: Mystery Domains

Now, this is something I have done for a long time via GPO!

Dave

-----Original Message-----
From: Free, Bob [mailto:r...@pge.com]
Sent: Wednesday, February 25, 2009 1:50 PM
To: NT System Admin Issues
Subject: RE: Mystery Domains

Disable the computer browser service on your workstations....we did it
years ago and never looked back. At the very least disable the ability
of your workstations to maintain a browse list.

His computer has probably become a browse master (or backup) for the
network it is on, is picking up all the workgroups/domains his fellow
travelers are broadcasting on whatever adapter he has connected at the
hotel and barfing them over the VPN adapter into your network.

From: Steven Calvanese [mailto:scalvan...@membersolutions.com]
Sent: Wednesday, February 25, 2009 10:50 AM
To: NT System Admin Issues
Subject: Mystery Domains

I just noticed all of these extra domains in my Microsoft Windows
Network list.

I have a user vpning to us from a hotel right now.  I think that is
where these could be coming from.

Does anyone know how to stop this and how to flush this list?


CONFIDENTIALITY NOTE: This email and any attachments are confidential
and intended for the sole use of the persons named in the email.
________________________________________





~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~




~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to